HP FutureSmart - FutureSmart configuration changes for Microsoft channel binding and LDAP signing requirements for Windows (white paper)
2 
Introduction 
Microsoft release a security advisory
1
 in August 2019 providing guidance to increase security for communications 
between LDAP clients and Active Directory domain controllers. Unsafe default configurations for LDAP channel binding 
and LDAP signing exist on Active Directory domain controllers. See Microsoft Advisory “ADV190023 - Microsoft Guidance 
for Enabling LDAP Channel Binding and LDAP Signing” for additional information. 
On March 10
th
, 2020 Microsoft will include options to harden LDAP communications on Active Directory domain 
controllers in the March windows update. These include a new group policy object for LDAP channel binding and new 
event codes for LDAP signing and LDAP channel binding in the event viewer. 
Important: The March 10, 2020 updates do not change LDAP signing or LDAP channel binding default policies or their 
registry equivalents on new or existing Active Directory domain controllers. 
Detailed Description 
The recommended LDAP security hardening guidance recommended in ADV 190023
1
 is managed through two registry 
settings. 
•  “LDAPServerIntegrity” registry setting: 
When enabled the server will 
o  Reject LDAP simple binds on clear text (non-SSL encrypted) connections 
o  Reject Simple Authentication Security Layer (SASL) LDAP binds that do not request signing (integrity 
verification) 
Group Policy Setting 
Registry Setting 
None 
1 (default) 
Require Signing 
2 
•  “LdapEnforceChannelBinding” registry setting 
When enabled the server will 
•  Reject authentication requests that do not include channel binding tokens (CBT) that provide channel binding 
information to the server 
Group Policy Setting 
Registry Setting 
Never 
0 (default) 
When Supported 
1 (compatibility mode) 
Always 
2 
HP FutureSmart Printer Configuration Changes 
The following configuration changes are needed when enabling the LDAP hardening recommendations from Microsoft. 
! A Certificate of Authority (CA) certificate and corresponding intermediate certificates (if required) will need to be 
installed into the printer certificate store to validate the Active Directory server public certificate. This CA certificate is 
required to be able to use TCP port 636 for Windows authentication and LDAP queries over an encrypted SSL connection. 
1.  Obtain a CA certificate for the Active Directory server by contacting your IT server administrator. 








